Security

Security | News, how-tos, features, reviews, and videos

hunting and monitoring security threats
Tesla Model S

Windows security and protection [Windows logo/locks]

10 top security enhancements in Windows Server 2019

This new version of Windows Server offers several significant security upgrades over Server 2016, including tools to track ransomware and other malware, and to track lateral movement attacks.

discord store nitro section

Discord quietly changed ToS, clock is ticking for US users to opt out of arbitration

Discord changed its Terms of Service and the clock is ticking for U.S. users to opt out of the arbitration clause before being automatically opted in.

cloud security

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

Election 2016 teaser - A hacker pulls back the curtain on United States election data

3 ways politicians could prevent voting machines from being hacked (if they wanted to)

The current state of voting security is laughably bad, but we know how to secure voting machines. The problem isn't technical, but a lack of political will.

intro data breach circuit board technology security

Another government system breached; 75,000 people affected

The Centers for Medicare & Medicaid Service confirmed a breach. Apple CEO Tim Cook wants Bloomberg to retract the spychip story. A Connecticut city paid a ransom to unlock 23 servers.

cyber security lock padlock firewall code breach password

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

detective with magnifying glass

5 open source intrusion detection tools that are too good to ignore

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

money case ransom hundreds

7 best practices for negotiating ransomware payments

Sometimes companies are forced to meet cyber criminals’ ransom or extortion demands. This advice will give you your best chance to get your data back and preserve your reputation.

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

ransomware

Ransomware attack hits North Carolina water utility following hurricane

A North Carolina water utility still recovering from Hurricane Florence became the victim of a ransomware attack.

network of connections / digital matrix

Review: Protecting API connections with Forum Sentry

The Forum Sentry API Security Gateway goes beyond access control and deep into security, monitoring all the connections that it forms between systems and enforcing very granular security policies.

Microsoft Windows 10 logo bandage data map
Updated

Best new Windows 10 security features: More patching, updating flexibility

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1809 feature release.

voter registration application

35 million voter records from 19 states for sale on hacking forum

Researchers found more than 35 million U.S. voter records for sale on a hacking forum. The records are from 2018 voter registrations in 19 states, including Wisconsin, Texas and Georgia.

supply chain management problems in need of solutions

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.

network interface connections

Zeek: A free, powerful way to monitor networks, detect threats

Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

ship wheel captain leadership

Improving cybersecurity culture requires clarity, commitment

Only a third of employees have a sound understanding of their role in their organizations’ security culture.

Load More